Patch Name | Windows6.0-2008-SP2-KB2509553-x64.msu | ||||||||||||||||||||||||||||
Patch Description | Security Update for Windows Server 2008 x64 Edition (KB2509553) | ||||||||||||||||||||||||||||
Bulletin Id | MS11-030 | ||||||||||||||||||||||||||||
Bulletin Title | Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553) | ||||||||||||||||||||||||||||
Severity | Critical | ||||||||||||||||||||||||||||
Location Path | Windows6.0-2008-SP2-KB2509553-x64.msu | ||||||||||||||||||||||||||||
Bulletin Summary | This security update resolves a privately reported vulnerability in Windows DNS resolution. The vulnerability could allow remote code execution if an attacker gained access to the network and then created a custom program to send specially crafted LLMNR broadcast queries to the target systems. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the LLMNR ports should be blocked from the Internet. | ||||||||||||||||||||||||||||
Superceding Bulletin Id | None | ||||||||||||||||||||||||||||
Patch Release Date | Apr 12, 2011 | ||||||||||||||||||||||||||||
Affected Product Information
|
Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.